語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and privacy trends in the i...
~
Alcaraz, Cristina.
Security and privacy trends in the industrial internet of things
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Security and privacy trends in the industrial internet of thingsedited by Cristina Alcaraz.
其他作者:
Alcaraz, Cristina.
出版者:
Cham :Springer International Publishing :2019.
面頁冊數:
xiii, 310 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer securityCongresses.
電子資源:
https://doi.org/10.1007/978-3-030-12330-7
ISBN:
9783030123307$q(electronic bk.)
Security and privacy trends in the industrial internet of things
Security and privacy trends in the industrial internet of things
[electronic resource] /edited by Cristina Alcaraz. - Cham :Springer International Publishing :2019. - xiii, 310 p. :ill., digital ;24 cm. - Advanced sciences and technologies for security applications,1613-5113. - Advanced sciences and technologies for security applications..
Part 1. Security Analysis and Advanced Threats -- Securing industrial Control Systems -- Towards a Secure Industrial Internet of Things -- Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things -- Part 2. Secure Interconnection Mechanisms -- A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT -- Access Control in the Industrial Internet of Things -- A Distributed Usage Control Framework for Industrial Internet of Things -- Part 3. Advanced Protection Techniques -- Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detectionl -- Improving Security in Industrial Internet of Things: a Distributed Intrusion Detection Methodology -- Who's there? Evaluating data source integrity and veracity in IIoT using Multivariate Statistical Process Control -- Secure Machine to Machine Communication in Industrial Internet of Things -- Part 4. Privacy Issues in Industrial Connected Networks -- Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things -- Security and Privacy Techniques for the Industrial Internet of Thing -- Part 5. Application Scenarios -- IIoT in the Hospital scenario: Hospital 4.0, Blockchain and Robust Data Management -- Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT) The incorporation of the new embedded technologies and the interconnected networking advances in the automation and monitoring processes, certainly multiplies the functional complexities of the underlying control system, whilst increasing security and privacy risks. The critical nature of the application context and its relevance for the well-being of citizens and their economy, attracts the attention of multiple, advanced attackers, with stealthy abilities to evade security policies, ex-filter information or exploit vulnerabilities. Some real-life events and registers in CERTs have already clearly demonstrated how the control industry can become vulnerable to multiple types of advanced threats whose focus consists in hitting the safety and security of the control processes. This book, therefore, comprises a detailed spectrum of research papers with highly analytical content and actuation procedures to cover the relevant security and privacy issues such as data protection, awareness, response and resilience, all of them working at optimal times. Readers will be able to comprehend the construction problems of the fourth industrial revolution and are introduced to effective, lightweight protection solutions which can be integrated as part of the new IIoT-based monitoring ecosystem.
ISBN: 9783030123307$q(electronic bk.)
Standard No.: 10.1007/978-3-030-12330-7doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / S43 2019
Dewey Class. No.: 005.8
Security and privacy trends in the industrial internet of things
LDR
:04106nmm a2200349 a 4500
001
558706
003
DE-He213
005
20190513173717.0
006
m d
007
cr nn 008maaau
008
191219s2019 gw s 0 eng d
020
$a
9783030123307$q(electronic bk.)
020
$a
9783030123291$q(paper)
024
7
$a
10.1007/978-3-030-12330-7
$2
doi
035
$a
978-3-030-12330-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
S43 2019
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S446 2019
245
0 0
$a
Security and privacy trends in the industrial internet of things
$h
[electronic resource] /
$c
edited by Cristina Alcaraz.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xiii, 310 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advanced sciences and technologies for security applications,
$x
1613-5113
505
0
$a
Part 1. Security Analysis and Advanced Threats -- Securing industrial Control Systems -- Towards a Secure Industrial Internet of Things -- Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things -- Part 2. Secure Interconnection Mechanisms -- A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT -- Access Control in the Industrial Internet of Things -- A Distributed Usage Control Framework for Industrial Internet of Things -- Part 3. Advanced Protection Techniques -- Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detectionl -- Improving Security in Industrial Internet of Things: a Distributed Intrusion Detection Methodology -- Who's there? Evaluating data source integrity and veracity in IIoT using Multivariate Statistical Process Control -- Secure Machine to Machine Communication in Industrial Internet of Things -- Part 4. Privacy Issues in Industrial Connected Networks -- Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things -- Security and Privacy Techniques for the Industrial Internet of Thing -- Part 5. Application Scenarios -- IIoT in the Hospital scenario: Hospital 4.0, Blockchain and Robust Data Management -- Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
520
$a
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT) The incorporation of the new embedded technologies and the interconnected networking advances in the automation and monitoring processes, certainly multiplies the functional complexities of the underlying control system, whilst increasing security and privacy risks. The critical nature of the application context and its relevance for the well-being of citizens and their economy, attracts the attention of multiple, advanced attackers, with stealthy abilities to evade security policies, ex-filter information or exploit vulnerabilities. Some real-life events and registers in CERTs have already clearly demonstrated how the control industry can become vulnerable to multiple types of advanced threats whose focus consists in hitting the safety and security of the control processes. This book, therefore, comprises a detailed spectrum of research papers with highly analytical content and actuation procedures to cover the relevant security and privacy issues such as data protection, awareness, response and resilience, all of them working at optimal times. Readers will be able to comprehend the construction problems of the fourth industrial revolution and are introduced to effective, lightweight protection solutions which can be integrated as part of the new IIoT-based monitoring ecosystem.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Data protection
$v
Congresses.
$3
384517
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
384553
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Privacy.
$3
268519
650
2 4
$a
Crime Control and Security.
$3
790897
650
2 4
$a
Cybercrime.
$3
748274
650
2 4
$a
Security Science and Technology.
$3
510148
700
1
$a
Alcaraz, Cristina.
$3
823113
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Advanced sciences and technologies for security applications.
$3
738348
856
4 0
$u
https://doi.org/10.1007/978-3-030-12330-7
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000171096
電子館藏
1圖書
電子書
EB QA76.9.A25 S446 2019 2019
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-12330-7
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入